Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 101 - 125 of 2297

Practical Attack on All Parameters of the DME Signature Scheme

April 28, 2024
Author(s)
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the candidates. The public key is constructed from the alternation of very structured linear and non-linear

Incorporating Syncable Authenticators Into NIST SP 800-63B

April 22, 2024
Author(s)
Ryan Galluzzo, Andrew Regenscheid, David Temoshok, Connie LaSalle
This supplement to NIST Special Publication 800-63B, Authentication and Lifecycle Management, provides agencies with additional guidance on the use of authenticators that may be synced between devices.

Automated Network Programmability Using OpenConfig YANG Models and NETCONF Protocol

April 2, 2024
Author(s)
Abderrahim Amlou, Amar Abane, Mheni Merzouki, Lydia Ait Oucheggou, Zineb Maasaoui, Abdella Battou
This paper introduces a microservice-based architecture designed to enable automation of network programmability and management. Amid the complexity of today's networks and the diversity of equipment, achieving efficient and reliable network

Non-Fungible Token Security

March 1, 2024
Author(s)
Peter Mell, Dylan Yaga
Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for autographing digital assets (associating one's name with a digital

XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF

March 1, 2024
Author(s)
John Kelsey, Stefan Lucks, Stephan Muller
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e. a seed drawn from any ramdom source with sufficient entropy. The current paper formalizes a security notion for a DRBG, allowing the attacker to

Challenges of Assured Autonomy

February 28, 2024
Author(s)
D. Richard Kuhn
This article summarizes some recent novel approaches to the problem of verification, testing, and assurance of autonomous systems. These include proxy verification and combinatorial methods for input space coverage measurement, which also has applications

Application of the Hybrid Satellite Network Cybersecurity Framework Profile: An Example Implementation of NIST IR 8441

February 23, 2024
Author(s)
Frederick R. Byers, Dan Mamula, Karri Meldorf, Joseph Brule, Rory Jennings, John Wiltberger, Eugene Craft, John Dombrowski, O'Ryan Lattin, Abdul Noor, Matt Yetto, Aliaksander Mamonau, Oksana Slivina, Jay Sharma, Dr. Kangmin Zheng
The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The elements of an HSN may have

Human-in-the-loop for Bayesian autonomous materials phase mapping

February 7, 2024
Author(s)
Felix Adams, Austin McDannald, Ichrio Takeuchi, A. Gilad Kusne
Autonomous experimentation achieves user objectives more efficiently than Edisonian studies by combining machine learning and laboratory automation to iteratively select and perform experiments. Integrating knowledge from theory, simulations, literature

Combinatorial testing for building reliable systems

February 5, 2024
Author(s)
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing is an approach where test suites are developed by efficiently covering interactions of parameter values and configuration settings. Multiple studies over the years have shown the interesting phenomenon where almost all defects in a

Use Cases for Secure and Trusted Granular Data Sharing Among Disparate Databases

January 30, 2024
Author(s)
Joanna DeFranco, David Ferraiolo, Joshua Roberts, D. Richard Kuhn
Sharing data among disparate organizations can be extremely difficult, when the data comes from different database management systems (DBMS). Most problematic is that data stored at another organization most likely uses different DBMS schemas and

Employing Word-Embedding for Schema Matching in Standard Lifecycle Management

December 29, 2023
Author(s)
Hakju Oh, Boonserm Kulvatunyou, Albert T. Jones, Tim Finin
Today, businesses rely on numerous information systems to achieve their production goals and improve their global competitiveness. Semantically integrating those systems is essential for businesses to achieve both. To do so, businesses must rely on

Cybersecurity of Genomic Data

December 20, 2023
Author(s)
Ronald Pulivarti, Natalia Globus, Frederick R. Byers, Justin Wagner, Justin Zook, Samantha Maragh, Jennifer McDaniel, Kevin Wilson, Martin Wojtyniak, Brett Kreider, Ann-Marie France, Sallie Edwards, Tommy Morris, Jared Sheldon, Scott Ross, Phillip Whitlow
Genomic data has enabled the rapid growth of the U.S. bioeconomy and is valuable to the individual, industry, and government because it has multiple intrinsic properties that in combination make it different from other types of high value data which
Displaying 101 - 125 of 2297
Was this page helpful?